Monthly Archives: October 2013

Background I have been looking to get a laptop like machine to use as a hackery system. Something I could take with me on travel, and something I could mess up on a regular basis without disrupting my work / … Continue reading →

Background Anytime we get real data on Internet user passwords, we once again discover people are bad with passwords. Additionally as the tools to compromise and crack passwords get better, even high quality passwords are becoming less secure. Two factor … Continue reading →

Background Say it with me folks, “Security is a system”. In case it is not obvious what that means, I will articulate. Security is made up of a collection of parts, and the system security of this collection is not … Continue reading →

Background Most of us do not see our activities on the Internet as a system, and if it is a system we are not sure what that has to do with securing ourselves on the Internet. First lets look at … Continue reading →

Personal security and privacy on the Internet are often seen as lost dreams – something we sacrificed in back in the 90s without a clue. In this blog, I cannot give this back to you, but my hope is to … Continue reading →

For the most part, security features of iOS and Android are fairly well matched, being driven by the same threat environment and competitor feature sets. Over the last year, one exception to that has been the User Permissions control in … Continue reading →

In the past I have written some whitepapers of some topical interest, and they are in MS Word / PDF format. The attached documents include: Mobile Security-AndroidMalware-2013-Mar: General De-FUDing (FUD=fear, uncertainty and doubt) of Android Security by explaining what the … Continue reading →